At the time this presentation is made, most of the top 400 large utilities will have completed theirvulnerability assessments and will have a very detailed list of proposed improvements to theirsystem, procedures and polices that will reduce their risk to threats from a terrorist group. Thecost to utilities to make these improvements will test budgets everywhere, and may require rateincreases. When asked about how much utilities will spend on security at a recent conference,most large utilities estimate one-to-three percent of their budget. But which investments willreally be made, will they be only made this year, and will they only provide benefits if thatterrorist attacks?This paper describes how technology can be your strategy to help reduce your risk and avoidadding long-term recurring costs that do not contribute to your bottom line. This paper is limitedto an overview level in order to protect secure information and to defer to the latest updatedinformation for the presentation where the latest technology applications (case studies) will bepresented. Includes figure.
Product Details
Edition: Vol. - No. Number of Pages: 3File Size: 1 file , 1.7 MB